Analysis

  • max time kernel
    198s
  • max time network
    264s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 06:04

General

  • Target

    8138cca4d65de2d85c6fdebc65009c8104a0da942387baf2ef0c3b1315a1f874.exe

  • Size

    1.2MB

  • MD5

    c3bada2d2ae1cb6a1b6fee1c579543ff

  • SHA1

    cb0a3175dedca399c6f535af981b82fb33692046

  • SHA256

    8138cca4d65de2d85c6fdebc65009c8104a0da942387baf2ef0c3b1315a1f874

  • SHA512

    283c08bc69e27750e862ad2f5f421846eddda645a97835151c234b11c1b0a6ea0cd8e79c4ac6cb6ba5c483e164862c5a65dec000d3226f35c0b62dbde16a0285

  • SSDEEP

    24576:AvmrDkTShx/S8ngS0UdnreKoctkEp3W8AD/Dhd+y4lqJ8QdCYDoDNKn01:Avyhxq8ndnreKDsvD/DX+y4onCYDoD5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8138cca4d65de2d85c6fdebc65009c8104a0da942387baf2ef0c3b1315a1f874.exe
    "C:\Users\Admin\AppData\Local\Temp\8138cca4d65de2d85c6fdebc65009c8104a0da942387baf2ef0c3b1315a1f874.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start C:\Users\Admin\AppData\Local\Temp\\dpvsetup.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\dpvsetup.exe
        C:\Users\Admin\AppData\Local\Temp\\dpvsetup.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1140
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start C:\Users\Admin\AppData\Local\Temp\\file.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        C:\Users\Admin\AppData\Local\Temp\\file.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:1888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dpvsetup.exe

    Filesize

    81KB

    MD5

    ea36b806e30d927f70e24eaf545ccc17

    SHA1

    92ab07441979c65ddcde4e1d9a96c7cb20c756a0

    SHA256

    626dd52e7727113b0d25ba73d1743edbdd7ea57c1fc31b678b22b1587a3e0eb1

    SHA512

    9c118d72af3d1c77b11bab80c3ca6e730313bd29fb8eab90dffacfb22ab11598f8f976abe8e3710597ed55fd957dc03cfdc9d26070421d7deb9195a5ad80204a

  • C:\Users\Admin\AppData\Local\Temp\dpvsetup.exe

    Filesize

    81KB

    MD5

    ea36b806e30d927f70e24eaf545ccc17

    SHA1

    92ab07441979c65ddcde4e1d9a96c7cb20c756a0

    SHA256

    626dd52e7727113b0d25ba73d1743edbdd7ea57c1fc31b678b22b1587a3e0eb1

    SHA512

    9c118d72af3d1c77b11bab80c3ca6e730313bd29fb8eab90dffacfb22ab11598f8f976abe8e3710597ed55fd957dc03cfdc9d26070421d7deb9195a5ad80204a

  • C:\Users\Admin\AppData\Local\Temp\file.exe

    Filesize

    600KB

    MD5

    7c621d0aed5235ca3d78762aded7eed5

    SHA1

    0b8c5cd23f592a8ff02e0473caa81b6e672e4769

    SHA256

    adb59f8e5ddf551c3fc3f45ebfba516d9caa3dc7bd9ca3c6a07aa3453e6bf0b3

    SHA512

    4a625db6c29d814ddc072255f9af063d408ee8f4629951a15842c633f31259706d06364ad50deb1e18c59ed099bfe24a69dd300aaada0ed7e0f16596001e8065

  • C:\Users\Admin\AppData\Local\Temp\file.exe

    Filesize

    600KB

    MD5

    7c621d0aed5235ca3d78762aded7eed5

    SHA1

    0b8c5cd23f592a8ff02e0473caa81b6e672e4769

    SHA256

    adb59f8e5ddf551c3fc3f45ebfba516d9caa3dc7bd9ca3c6a07aa3453e6bf0b3

    SHA512

    4a625db6c29d814ddc072255f9af063d408ee8f4629951a15842c633f31259706d06364ad50deb1e18c59ed099bfe24a69dd300aaada0ed7e0f16596001e8065

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    1.1MB

    MD5

    97c8fe752e354b2945e4c593a87e4a8b

    SHA1

    03ab4c91535ecf14b13e0258f3a7be459a7957f9

    SHA256

    820d8dd49baed0da44d42555ad361d78e068115661dce72ae6578dcdab6baead

    SHA512

    af4492c08d6659d21ebfefe752b0d71210d2542c1788f1d2d9f86a85f01c3dd05eebf61c925e18b5e870aec7e9794e4a7050a04f4c58d90dca93324485690bcc

  • \Users\Admin\AppData\Local\Temp\E_4\shell.fne

    Filesize

    56KB

    MD5

    d63851f89c7ad4615565ca300e8b8e27

    SHA1

    1c9a6c1ce94581f85be0e99e2d370384b959578f

    SHA256

    0a6ae72df15cbca21c6af32bc2c13ca876e191008f1078228b3b98add9fc9d8d

    SHA512

    623e9e9beb5d2a9f3a6a75e5fac9dda5b437246fd3b10db4bba680f61bc68aae6714f11a12938b7d22b1c7691f45a75c4406ba06fa901da8ce05e784038970d2

  • \Users\Admin\AppData\Local\Temp\dpvsetup.exe

    Filesize

    81KB

    MD5

    ea36b806e30d927f70e24eaf545ccc17

    SHA1

    92ab07441979c65ddcde4e1d9a96c7cb20c756a0

    SHA256

    626dd52e7727113b0d25ba73d1743edbdd7ea57c1fc31b678b22b1587a3e0eb1

    SHA512

    9c118d72af3d1c77b11bab80c3ca6e730313bd29fb8eab90dffacfb22ab11598f8f976abe8e3710597ed55fd957dc03cfdc9d26070421d7deb9195a5ad80204a

  • \Users\Admin\AppData\Local\Temp\dpvsetup.exe

    Filesize

    81KB

    MD5

    ea36b806e30d927f70e24eaf545ccc17

    SHA1

    92ab07441979c65ddcde4e1d9a96c7cb20c756a0

    SHA256

    626dd52e7727113b0d25ba73d1743edbdd7ea57c1fc31b678b22b1587a3e0eb1

    SHA512

    9c118d72af3d1c77b11bab80c3ca6e730313bd29fb8eab90dffacfb22ab11598f8f976abe8e3710597ed55fd957dc03cfdc9d26070421d7deb9195a5ad80204a

  • \Users\Admin\AppData\Local\Temp\dpvsetup.exe

    Filesize

    81KB

    MD5

    ea36b806e30d927f70e24eaf545ccc17

    SHA1

    92ab07441979c65ddcde4e1d9a96c7cb20c756a0

    SHA256

    626dd52e7727113b0d25ba73d1743edbdd7ea57c1fc31b678b22b1587a3e0eb1

    SHA512

    9c118d72af3d1c77b11bab80c3ca6e730313bd29fb8eab90dffacfb22ab11598f8f976abe8e3710597ed55fd957dc03cfdc9d26070421d7deb9195a5ad80204a

  • \Users\Admin\AppData\Local\Temp\dpvsetup.exe

    Filesize

    81KB

    MD5

    ea36b806e30d927f70e24eaf545ccc17

    SHA1

    92ab07441979c65ddcde4e1d9a96c7cb20c756a0

    SHA256

    626dd52e7727113b0d25ba73d1743edbdd7ea57c1fc31b678b22b1587a3e0eb1

    SHA512

    9c118d72af3d1c77b11bab80c3ca6e730313bd29fb8eab90dffacfb22ab11598f8f976abe8e3710597ed55fd957dc03cfdc9d26070421d7deb9195a5ad80204a

  • \Users\Admin\AppData\Local\Temp\file.exe

    Filesize

    600KB

    MD5

    7c621d0aed5235ca3d78762aded7eed5

    SHA1

    0b8c5cd23f592a8ff02e0473caa81b6e672e4769

    SHA256

    adb59f8e5ddf551c3fc3f45ebfba516d9caa3dc7bd9ca3c6a07aa3453e6bf0b3

    SHA512

    4a625db6c29d814ddc072255f9af063d408ee8f4629951a15842c633f31259706d06364ad50deb1e18c59ed099bfe24a69dd300aaada0ed7e0f16596001e8065

  • \Users\Admin\AppData\Local\Temp\file.exe

    Filesize

    600KB

    MD5

    7c621d0aed5235ca3d78762aded7eed5

    SHA1

    0b8c5cd23f592a8ff02e0473caa81b6e672e4769

    SHA256

    adb59f8e5ddf551c3fc3f45ebfba516d9caa3dc7bd9ca3c6a07aa3453e6bf0b3

    SHA512

    4a625db6c29d814ddc072255f9af063d408ee8f4629951a15842c633f31259706d06364ad50deb1e18c59ed099bfe24a69dd300aaada0ed7e0f16596001e8065

  • memory/1032-61-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1032-58-0x0000000000220000-0x0000000000234000-memory.dmp

    Filesize

    80KB

  • memory/1032-56-0x0000000075C31000-0x0000000075C33000-memory.dmp

    Filesize

    8KB

  • memory/1032-55-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB